General
-
Target
EpicInstaller-17.2.0.msi
-
Size
194.0MB
-
Sample
241217-wg6sqatlfv
-
MD5
392f66528c31a402484379f57d0605a1
-
SHA1
40d155146d49258d3f3e3d8bacc6c919ad8c1d35
-
SHA256
bdb77e87b9d666634e182ea42482d9559125ca8e62c2399b8ad2c6b42395aaa8
-
SHA512
24924b00dc61295ff9fd8f003addaa2f56e6774d2b6e20c068d0d538f0c2b1e2af9c6ca117b9718513218734596a93540e8674294ec67ea91f4dec865b473600
-
SSDEEP
3145728:HyCHcktJLbo4ZW0AF7PPMQxSkn2XbtOk1Ne4rkq//id544fVHBo9LE5XCJuo:Tc81WtsXk2XbcPdij4cJE5XC
Static task
static1
Behavioral task
behavioral1
Sample
EpicInstaller-17.2.0.msi
Resource
win10v2004-20241007-es
Malware Config
Extracted
lumma
Targets
-
-
Target
EpicInstaller-17.2.0.msi
-
Size
194.0MB
-
MD5
392f66528c31a402484379f57d0605a1
-
SHA1
40d155146d49258d3f3e3d8bacc6c919ad8c1d35
-
SHA256
bdb77e87b9d666634e182ea42482d9559125ca8e62c2399b8ad2c6b42395aaa8
-
SHA512
24924b00dc61295ff9fd8f003addaa2f56e6774d2b6e20c068d0d538f0c2b1e2af9c6ca117b9718513218734596a93540e8674294ec67ea91f4dec865b473600
-
SSDEEP
3145728:HyCHcktJLbo4ZW0AF7PPMQxSkn2XbtOk1Ne4rkq//id544fVHBo9LE5XCJuo:Tc81WtsXk2XbcPdij4cJE5XC
-
Lumma family
-
A potential corporate email address has been identified in the URL: [email protected]
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3